Explore >> Select a destination


You are here

jeremykun.wordpress.com
| | windowsontheory.org
2.1 parsecs away

Travel
| | Guest post by Boaz Barak and Zvika Brakerski (part 2) In the previous post, we demonstrated the versatility of fully homomorphic encryption and its applicability for multiple applications. In this post we will demonstrate (not too painfully, we hope) how fully homomorphic encryption is constructed. Our goal is to present the simplest solution that (we...
| | www.ayoub-benaissa.com
1.6 parsecs away

Travel
| | This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic.
| | blog.openmined.org
2.2 parsecs away

Travel
| | From the math and the hard problem behind most of today's homomorphic encryption scheme to implementing your own in python.
| | www.jeremykun.com
4.2 parsecs away

Travel
| This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes. The basis for many FHE schemes, as well as other privacy-preserving protocols, is the Learning With Errors (LWE) problem.